咨询与建议

限定检索结果

文献类型

  • 19 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 10 篇 计算机科学与技术...
    • 9 篇 信息与通信工程
    • 5 篇 软件工程
    • 3 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 核科学与技术
  • 6 篇 理学
    • 3 篇 数学
    • 2 篇 物理学
    • 1 篇 生物学
  • 1 篇 医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 20 篇 encryption proto...
  • 4 篇 data encryption ...
  • 4 篇 wireless sensor ...
  • 3 篇 computer network...
  • 3 篇 data protection
  • 2 篇 wireless communi...
  • 2 篇 computer securit...
  • 2 篇 confidential com...
  • 2 篇 security
  • 2 篇 cryptography
  • 1 篇 localization (ma...
  • 1 篇 state machines
  • 1 篇 traffic analysis
  • 1 篇 biometric identi...
  • 1 篇 chinese remainde...
  • 1 篇 data security
  • 1 篇 entanglement net...
  • 1 篇 quantum computin...
  • 1 篇 quantum systems
  • 1 篇 smart card reade...

机构

  • 1 篇 univ naples fede...
  • 1 篇 nanjing univ pos...
  • 1 篇 china natl digit...
  • 1 篇 dokuz eylul univ...
  • 1 篇 univ chinese aca...
  • 1 篇 univ aizu sch en...
  • 1 篇 slim architetti ...
  • 1 篇 surrey u.k.
  • 1 篇 dalhousie univ d...
  • 1 篇 muroran inst tec...
  • 1 篇 shanghai univ el...
  • 1 篇 instituto de fís...
  • 1 篇 beijing inst tec...
  • 1 篇 nanjing univ pos...
  • 1 篇 china univ geosc...
  • 1 篇 ostim tech univ ...
  • 1 篇 commun univ chin...
  • 1 篇 northumbria univ...
  • 1 篇 centre for quant...
  • 1 篇 naval univ engn ...

作者

  • 1 篇 li sen
  • 1 篇 li shouliang
  • 1 篇 benazzi alessand...
  • 1 篇 jia hongyong
  • 1 篇 ota kaoru
  • 1 篇 joseph f. fitzsi...
  • 1 篇 robertson willia...
  • 1 篇 celeda p.
  • 1 篇 a. saboia
  • 1 篇 li longyijia
  • 1 篇 liu qin
  • 1 篇 carlos a. pérez-...
  • 1 篇 s. p. walborn
  • 1 篇 a. t. avelar
  • 1 篇 gu lize
  • 1 篇 gharaei niayesh
  • 1 篇 f. toscano
  • 1 篇 drasar m.
  • 1 篇 moh'd abidalrahm...
  • 1 篇 ibrahim alaauldi...

语言

  • 20 篇 英文
检索条件"主题词=encryption protocols"
20 条 记 录,以下是1-10 订阅
排序:
A Secure Middlebox Framework for Enabling Visibility Over Multiple encryption protocols
收藏 引用
IEEE-ACM TRANSACTIONS ON NETWORKING 2020年 第6期28卷 2727-2740页
作者: Han, Juhyeng Kim, Seongmin Cho, Daeyang Choi, Byungkwon Ha, Jaehyeong Han, Dongsu Korea Adv Inst Sci & Technol Sch Elect Engn Daejeon 34141 South Korea Sungshin Womens Univ Dept Convergence Secur Engn Seoul 02844 South Korea
Network middleboxes provide the first line of defense for enterprise networks. Many of them typically inspect packet payload to filter malicious attack patterns. However, the widespread use of end-to-end cryptographic... 详细信息
来源: 评论
Smart Card-Based Vehicle Ignition Systems: Security, Regulatory Compliance, Drug and Impairment Detection, Through Advanced Materials and Authentication Technologies
收藏 引用
PROCESSES 2025年 第3期13卷 911-911页
作者: Vitiello, Vincenzo Benazzi, Alessandro Trucillo, Paolo Inventori Cavensi Via 25 Luglio 87 I-84013 Cava De Tirreni Italy Slim Architetti Via Savio 1087 I-47522 Cesena Italy Univ Naples Federico II Dipartimento Ingn Chim Mat & Prod Ind Ple V Tecchio 80 I-80125 Naples Italy
This study investigates the integration of smart card readers into vehicle ignition systems as a multifaceted solution to enhance security, regulatory compliance, and road safety. By implementing real-time driver veri... 详细信息
来源: 评论
Dual on-premises storage framework for memory optimization and secure data transmission in nuclear power plants
收藏 引用
NUCLEAR ENGINEERING AND TECHNOLOGY 2025年 第7期57卷
作者: Gharaei, Niayesh OSTIM Tech Univ Fac Engn Dept Comp Engn Ankara Turkiye
In nuclear power plants, efficiently managing sensitive data and ensuring secure transmission between nodes and storage systems are critical for maintaining operational integrity and safety. This paper proposes a nove... 详细信息
来源: 评论
encryption Protocol for Resource-Constrained Devices in Fog-Based IoT Using One-Time Pads
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2019年 第2期6卷 3925-3933页
作者: Boakye-Boateng, Kwasi Kuada, Eric Antwi-Boasiako, Emmanuel Djaba, Emmanuel Ghana Inst Management & Publ Adm Sch Technol Accra Ghana
Fog computing allows data to be processed on the network edge without reaching the cloud infrastructure to reduce latency and network bandwidth. However, it is not without its security challenges as existing security ... 详细信息
来源: 评论
An Advanced encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP
收藏 引用
JOURNAL OF SENSORS 2017年 第8-31期2017卷 1-10页
作者: Ibrahim, Alaauldin Dalkilic, Gokhan Dokuz Eylul Univ Comp Engn Dept TR-35160 Izmir Turkey
Information in patients' medical histories is subject to various security and privacy concerns. Meanwhile, any modification or error in a patient's medical data may cause serious or even fatal harm. To protect... 详细信息
来源: 评论
A Secure Network Coding Based on Broadcast encryption in SDN
收藏 引用
MATHEMATICAL PROBLEMS IN ENGINEERING 2016年 第1期2016卷 1-8页
作者: Chen, Yue Jia, Hongyong Huang, Kaixiang Lan, Julong Yan, Xincheng State Key Lab Math Engn & Adv Comp Zhengzhou 450001 Peoples R China China Natl Digital Switching Syst Engn & Technol Zhengzhou 450002 Peoples R China
By allowing intermediate nodes to encode the received packets before sending them out, network coding improves the capacity and robustness of multicast applications. But it is vulnerable to the pollution attacks. Some... 详细信息
来源: 评论
A Novel 1D Hybrid Chaotic Map-Based Image Compression and encryption Using Compressed Sensing and Fibonacci-Lucas Transform
收藏 引用
MATHEMATICAL PROBLEMS IN ENGINEERING 2016年 第1期2016卷 1-15页
作者: Zhang, Tongfeng Li, Shouliang Ge, Rongjun Yuan, Min Ma, Yide Lanzhou Univ Sch Informat Sci & Engn Lanzhou 730000 Gansu Peoples R China
A one-dimensional (1D) hybrid chaotic system is constructed by three different 1D chaotic maps in parallel-then-cascade fashion. The proposed chaotic map has larger key space and exhibits better uniform distribution p... 详细信息
来源: 评论
A survey of methods for encrypted traffic classification and analysis (vol 25, pg 355, 2015)
收藏 引用
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT 2015年 第6期25卷 526-527页
作者: Velan, P. Cermak, M. Celeda, P. Drasar, M. Institute of Computer Science Masaryk University Brno Czech Republic
With the widespread use of encrypted data transport, network traffic encryption is becoming a standard nowadays. This presents a challenge for traffic measurement, especially for analysis and anomaly detection methods... 详细信息
来源: 评论
Systematic construction of genuine-multipartite-entanglement criteria in continuous-variable systems using uncertainty relations
收藏 引用
Physical Review A 2015年 第5期92卷 052316-052316页
作者: F. Toscano A. Saboia A. T. Avelar S. P. Walborn Instituto de Física Universidade Federal do Rio de Janeiro Caixa Postal 68528 Rio de Janeiro RJ 21941-972 Brazil Instituto de Física Universidade Federal de Goiás Caixa Postal 131 Goiânia GO 74001-970 Brazil
A general procedure to construct criteria for identifying genuine multipartite continuous-variable entanglement is presented. It relies on the definition of adequate global operators describing the multipartite system... 详细信息
来源: 评论
A Fingerprint encryption Scheme Based on Irreversible Function and Secure Authentication
收藏 引用
COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE 2015年 第1期2015卷 1-10页
作者: Yang, Yijun Yu, Jianping Zhang, Peng Wang, Shulan Shenzhen Univ ATR Key Lab Natl Def Technol Shenzhen 518060 Peoples R China
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentica... 详细信息
来源: 评论